CVE-2023-21930: Unterschied zwischen den Versionen

Aus Wiki - Heidler Strichcode GmbH
Zur Navigation springen Zur Suche springen
(-> Englisch)
Zeile 1: Zeile 1:
= Quelle =
+
= Source =
 
https://nvd.nist.gov/vuln/detail/CVE-2023-21930
 
https://nvd.nist.gov/vuln/detail/CVE-2023-21930
  
= Beschreibung vom CVE =
+
= Description of this CVE =
 
"This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet)"
 
"This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet)"
  
= Betroffene Applikationen =
+
= Affected Applications =
''application name = Name der Applikation.''<br>
+
''affected version = From which version onwards there is a need for action.fixed version = Minimum version where the security vulnerability is fixed or not affected anymore.not affected = This application is not affected and therefore there is no need for action.all versions = Every single version is affected. A need for action is required regardless of the version''
''affected version = Für welche Versionssände Handlungsbedarf besteht.''<br>
 
''fixed version = Mindestversionsstand, in welcher die Sicherheitslücke behoben / nicht betroffen ist.''<br><br>
 
''not affected = Diese Applikation ist von der Sicherheitslücke nicht betroffen. Es besteht kein Handlungsbedarf.''<br><br>
 
 
{| class="wikitable"
 
{| class="wikitable"
 
|-
 
|-
! application name !! affected version !! fixed version
+
! Application Name !! Affected Version !! Fixed Version
 
|-
 
|-
 
| CarrierAPI || - || -
 
| CarrierAPI || - || -
 
|-
 
|-
| ComManager || 1.2.10 or higher  
+
| ComManager || 1.2.10 or higher
 
| 1.2.14
 
| 1.2.14
 
|-
 
|-
| DataGatewayServer V3 (DGS V3)<br>''alle Versionen 2.x.x sind ausgeschlossen'' || 3.8.14 or higher  
+
| DataGatewayServer V3 (DGS V3)<br>''alle Versionen 2.x.x sind ausgeschlossen''|| 3.8.14 or higher
 
| 3.8.24
 
| 3.8.24
 
|-
 
|-
Zeile 30: Zeile 27:
 
| HFMS (Tarifwerk) || - || -
 
| HFMS (Tarifwerk) || - || -
 
|-
 
|-
| HVS32AMAService || 1.3.5 or higher  
+
| HVS32AMAService || 1.3.5 or higher
 
| 1.3.7
 
| 1.3.7
 
|-
 
|-
 
| HVS32DBArchivierung || - || -
 
| HVS32DBArchivierung || - || -
 
|-
 
|-
| HVS32MonitoringService || 1.4.10 or higher  
+
| HVS32MonitoringService || 1.4.10 or higher
 
| 1.4.12
 
| 1.4.12
 
|-
 
|-
| HVS32MonitoringServiceLight || 1.5.7 or higher  
+
| HVS32MonitoringServiceLight || 1.5.7 or higher
 
| 1.5.9
 
| 1.5.9
 
|-
 
|-

Version vom 27. September 2023, 10:44 Uhr

Source

https://nvd.nist.gov/vuln/detail/CVE-2023-21930

Description of this CVE

"This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet)"

Affected Applications

affected version = From which version onwards there is a need for action.fixed version = Minimum version where the security vulnerability is fixed or not affected anymore.not affected = This application is not affected and therefore there is no need for action.all versions = Every single version is affected. A need for action is required regardless of the version

Application Name Affected Version Fixed Version
CarrierAPI - -
ComManager 1.2.10 or higher 1.2.14
DataGatewayServer V3 (DGS V3)
alle Versionen 2.x.x sind ausgeschlossen
3.8.14 or higher 3.8.24
FileConverter - -
FileMoveService - -
GLSBoxService - -
HFMS (Tarifwerk) - -
HVS32AMAService 1.3.5 or higher 1.3.7
HVS32DBArchivierung - -
HVS32MonitoringService 1.4.10 or higher 1.4.12
HVS32MonitoringServiceLight 1.5.7 or higher 1.5.9
IRIS - -
Leitcode - -
ScaleService - -
SEM-Manager - -
SEM-Web - -
Verladefreigabe - -
WatchLog - -